Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…
Tag: vulnerability
Researchers discover vulnerabilities in smart assistants’ voice commands
Virtual personal assistants (VPA), also known as smart assistants like Amazon’s Alexa and Google’s Assistant, are in the spotlight for vulnerabilities to…
A week in security (May 7 – May 13)
Last week on Labs, we looked at the case of a fake Android AV, an annoying adware that goes by the…
HTTPS… Everywhere!
We recently updated our redirections rule in HTTPS-Everywhere, a browser extension that automatically redirects you to the HTTPS version of the…
Top Exploit Kits Round Up | January Edition
This is an overview of the most popular exploit kits that we have caught in our honeypots in the past few weeks and have…
Introducing the Malwarebytes Anti-Ransomware Beta
For the last four years, ransomware has evolved into one of the biggest threats to cyber security that I’ve seen in…
Was Mac OS X really the most vulnerable in 2015?
Much has been said in the security world about the recent release of data on vulnerabilities discovered in 2015. Due to the…
4 Things to Consider When Assessing Device Posture for Effective Network Access Control
By Benny Czarny One of the main reasons to have a NAC (Network Access Control) system in place is to keep risky…
New Malwarebytes Anti-Exploit Adds Fingerprinting Detection
We just released a new version of our Malwarebytes Anti-Exploit software which is packed with new and advanced exploit detection and blocking…
What’s Patch Tuesday?
We’re two weeks out from Patch Tuesday. Chances are, an IT admin and/or CISO spent the day battening down the hatches while…